Apple Considering Less Disruptive Siri Behavior in Future Version of iPadOS

Say “Hey Siri ^(https://www.appmarsh.com/link/https://www.appmarsh.com/guide/siri/)” when using an iPad ^(https://www.appmarsh.com/link/https://www.appmarsh.com/roundup/ipad/), and Apple’s virtual assistant will take over the entirety of the display, obscuring whatever you were doing on the device. Say the same thing to your Mac, however, and Siri responds in a more multitasking-friendly way by appearing in a small window in the corner of the screen.

iPad concept of improved Siri behavior (image via iHelp BR ^(https://www.appmarsh.com/link/https://ihelpbr.com/craig-federighi-email-siri-menos-intrusiva-ipad/))


This less disruptive implementation of Siri in macOS may well be coming to iPad, although it’s unlikely to appear in the first version of iPadOS ^(https://www.appmarsh.com/link/https://www.appmarsh.com/roundup/ipados/), which is due to be released this fall. The possibility was hinted at by Craig Federighi, Apple’s VP of software engineering, in response to an email sent to him by Apple user Juliano Rossi.

Responding to Rossi’s request that Siri on iPadOS behaves like on the Mac, without filling the entire screen, Federighi wrote:

“Thanks for the comment. Glad to know you liked the presentation. What you have described is certainly valid feedback. Unfortunately this is not something we can add last minute but we will certainly consider for the future.”



As Federighi’s response suggests, adding this less intrusive Siri behavior would require some significant changes to the OS, so it’s not something that could be included at this late stage in software testing. But as Portuguese tech blog iHelp BR ^(https://www.appmarsh.com/link/https://ihelpbr.com/craig-federighi-email-siri-menos-intrusiva-ipad/) notes, it’s at least good to know that Apple is aware of the legitimate request, which would bring iPadOS even closer to the macOS experience.

Apple often considers user feedback, but sometimes takes a while to act on it. For instance, the company eventually responded to multiple user requests that it change the volume level indicator in iOS. When pressing the volume buttons on iPhone or iPad running iOS 12 ^(https://www.appmarsh.com/link/https://www.appmarsh.com/roundup/ios-12/) or earlier, the volume indicator displays in the center of the screen, obscuring content. As of iOS 13 ^(https://www.appmarsh.com/link/https://www.appmarsh.com/roundup/ios-13/), coming this fall, the indicator is smaller and appears at the side of the display in a less intrusive manner.

Unveiled last week during Apple’s WWDC keynote, iPadOS is designed to bring more desktop-class functionality to iPads with bigger screens. iPadOS will incorporate several features that recognize the tablet’s function as a potential computer replacement, including a new Home screen, an updated Split View to enhance multitasking, and improved Apple Pencil ^(https://www.appmarsh.com/link/https://www.appmarsh.com/roundup/apple-pencil/) support.

Related Roundups: iOS 13 ^(https://www.appmarsh.com/link/https://www.appmarsh.com/roundup/ios-13/), iPadOS ^(https://www.appmarsh.com/link/https://www.appmarsh.com/roundup/ipados/)

This article, “Apple Considering Less Disruptive Siri Behavior in Future Version of iPadOS ^(https://www.appmarsh.com/link/https://www.appmarsh.com/2019/06/10/apple-less-disruptive-siri-future-ipados-version/)” first appeared on appmarsh.com ^(https://www.appmarsh.com/link/https://www.appmarsh.com/)

Discuss this article ^(https://www.appmarsh.com/link/https://forums.appmarsh.com/threads/apple-considering-less-disruptive-siri-behavior-in-future-version-of-ipados.2185183/) in our forums

^(https://www.appmarsh.com/link/http://feeds.appmarsh.com/~ff/appmarsh-All?a=fmnj_WTGT2o:aZjXSWEDoeU:6W8y8wAjSf4) ^(https://www.appmarsh.com/link/http://feeds.appmarsh.com/~ff/appmarsh-All?a=fmnj_WTGT2o:aZjXSWEDoeU:qj6IDK7rITs)

IoT-Home-Guard – A Tool For Malicious Behavior Detection In IoT Devices

IoT-Home-Guard is a project to help people discover malware in smart home devices.
For users the project can help to detect compromised smart home devices. For security researchers it is also useful in network analysis and malicious hehaviors detection.
In July 2018 we had completed the first version. We will complete the second version by October 2018 with improvement of user experience and increased number of identifiable devices.
The first generation is a hardware device based on Raspberry Pi ^(https://www.appmarsh.com/link/http://www.kitploit.com/search/label/Raspberry%20Pi) with wireless network interface controllers. We will customize new hardware in the second generation. The system can be set up with software part in laptops after essential environment configuration. Software part is available in software_tools/.

device fingerprint ^(https://www.appmarsh.com/link/http://www.kitploit.com/search/label/Device%20FingerPrint) database.

  • Device fingerprint ^(https://www.appmarsh.com/link/http://www.kitploit.com/search/label/Fingerprint) database: Normal network behaviors of each devices, based on whitelist. Call APIs of 360 threat intelligence ^(https://www.appmarsh.com/link/http://www.kitploit.com/search/label/Threat%20Intelligence) database (https://ti.360.net/ ^(https://www.appmarsh.com/link/https://ti.360.net/)).
  • Web server: There may be a web server in the second generation.
  • Procedure

                                               ___________________       ___________________
    | | | |
    | data_flow_catcher |<----| devices connected |
    |___________________| |___________________|
    ¦
    ¦
    ____________________________ ____↓________________
    | | | |
    | device_fingerprint_databse |<---------> | flow_analyze_engine |
    |____________________________| ¦ |_____________________|
    ¦ ↑
    ¦ ¦
    __________________________________ ¦ ____↓_______ _________________
    | | ¦ | | | |
    | 360 threat intelligence database |<- | web_server |<-----------| user interfaces |
    |__________________________________| |____________| |_________________|

    The tool works as an Access Point, connected manually by devices under test, sends network traffic to traffic analyzing engine for characteristic extraction. Traffic analyzing engine compares characteristics with entries in device fingerprint database to recognize device type and suspicious network connection. Device fingerprint database is a collect of normal behaviors of each device based on whitelist. Additionally, characteristics will be searched on threat intelligence database of Qihoo 360 to identify malicious behaviors. A web server is set up as user interfaces.

    Effectiveness
    In our research, we have succcessfully implanted Trojans in eight devices including smart speakers, cameras, driving recorders and mobile translators with IoT-Implant-Toolkit.
    A demo video below:
    ^(https://www.appmarsh.com/link/https://github.com/arthastang/IoT-Home-Guard/blob/master/resources/ImplantDemo.gif)

    We collected characteristics of those devices and ran IoT-Home-Guard. All devices implanted Trojans have been detected. We believe that malicious behaviors of more devices can be identified with high accuracy after supplement of fingerprint database.

    Download IoT-Home-Guard ^(https://www.appmarsh.com/link/https://github.com/arthastang/IoT-Home-Guard)